Sciweavers

316 search results - page 44 / 64
» Where do security policies come from
Sort
View
HICSS
1998
IEEE
112views Biometrics» more  HICSS 1998»
13 years 11 months ago
The Dynamics of Market Power with Deregulated Electricity Generation Supplies
Deregulated wholesale markets for bulk electricity supplies are likely to deviate from the perfectly competitive ideal in many areas where transmission losses, costs and capacity ...
Richard E. Schuler
FLAIRS
2004
13 years 9 months ago
Finding Partners to Form Information Sharing Networks in Open Multi-Agent Systems
Information quality assurance despite the existence of uncertainty about sources can be investigated in the context of soft security where an agent maintains trustworthiness evalu...
K. Suzanne Barber, Jisun Park
ATAL
2004
Springer
14 years 27 days ago
Fitting and Compilation of Multiagent Models through Piecewise Linear Functions
Decision-theoretic models have become increasingly popular as a basis for solving agent and multiagent problems, due to their ability to quantify the complex uncertainty and prefe...
David V. Pynadath, Stacy Marsella
DEXAW
2004
IEEE
109views Database» more  DEXAW 2004»
13 years 11 months ago
Internet, GRID, Self-Adaptability and Beyond: Are We Ready?
This paper reflects different understanding and positions on future trends of GRID-oriented technologies, applications, and networks, as perceived by representatives from industry...
Petre Dini, Wolfgang Gentzsch, Mark Potts, Alexand...
CCS
2005
ACM
14 years 1 months ago
Obfuscated databases and group privacy
We investigate whether it is possible to encrypt a database and then give it away in such a form that users can still access it, but only in a restricted way. In contrast to conve...
Arvind Narayanan, Vitaly Shmatikov